CN108566389A - A kind of fingerprint identity validation method and device across application - Google Patents
A kind of fingerprint identity validation method and device across application Download PDFInfo
- Publication number
- CN108566389A CN108566389A CN201810266176.XA CN201810266176A CN108566389A CN 108566389 A CN108566389 A CN 108566389A CN 201810266176 A CN201810266176 A CN 201810266176A CN 108566389 A CN108566389 A CN 108566389A
- Authority
- CN
- China
- Prior art keywords
- identity validation
- fingerprint identity
- finger print
- request data
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of fingerprint identity validation method and devices across application, wherein includes across the fingerprint identity validation method of application:Obtain the fingerprint identity validation request data after ciphering signature;Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the legitimacy and integrality of the fingerprint identity validation request data;Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request data is obtained;Obtain finger print information to be certified;Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, fingerprint identity validation is executed under the legitimacy and integrality of data.
Description
Technical field
This application involves technical field of data processing, more particularly to a kind of fingerprint identity validation method and dress across application
It sets.
Background technology
With the fast development of mobile terminal device technology and Internet technology, more and more mobile terminal APP applications
In daily life, meets the needs of various aspects such as the financial social activity of people, clothing, food, lodging and transportion -- basic necessities of life, style entertainment.
Currently, most of APP are based primarily upon account+password or cell-phone number+password for the identification of client identity.
By industrial and commercial bank release melt e connection for, after client is registered using cell-phone number, be arranged static password, melting e connection APP accounts note
Volume link generally can be determined that I operates, but after melting e connection APP logins, as long as client does not exit current account, every time
When opening melts e connection APP, system can automated log on operation.And melt e connection APP and apply other than main common function, mostly
Number application is to carry out distinctive application exploitation by each branch based on public platform.A set of each branch is supplied to exist due to no
The mechanism of authenticating user identification is carried out when developing public platform distinctive application, certain is related to individual privacy in e connection public platforms if melted
The characteristic service of information requires only to allow account or cell-phone number that could inquire and operate, as long as then can open
Login account melts e connection, and theoretically anyone is it can be seen that relevant information, can also be operated by other people instead of me,
Because system can not judge that actual log melts the people that e connection APP is operated according to account and the login situation of password merely
Whether must be just client itself, thus will existence information security risk, this information security hidden danger also affect melts e connection
APP researches and develops the research and development of more personalized, privacy application scenarios in public platform.
Invention content
The purpose of the application embodiment is to provide a kind of fingerprint identity validation method and device across application, in branch's machine
Communication interaction, Trust Establishment, security verification and fingerprint identity validation are carried out between structure application program and finger print identifying server
Technical solution, each branch office application only needs to carry out simply to access configuration, and needs according to safety to send symbol
Close desired request data, you can the access of finishing device and calling.
To achieve the above object, the application embodiment provides a kind of fingerprint identity validation method across application, including:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request
According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained
Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data
Fingerprint identity validation is executed under legitimacy and integrality.
Preferably, obtain ciphering signature after fingerprint identity validation request data the step of include:
Establish the connection communication with the branch office application;
In communication process, the fingerprint identity validation request after ciphering signature is obtained from the branch office application
Data.
Preferably, the step of legitimacy and integrality for determining the fingerprint identity validation request data includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message
Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as
The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature
Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible
Appoint.
Preferably, the step of obtaining the fingerprint identity validation request data be:
Message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
Preferably, the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Preferably, include the step of execution fingerprint identity validation under the legitimacy of data and integrality:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server
The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information
It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
To achieve the above object, the application embodiment also provides a kind of fingerprint identity validation device across application, described
Device includes:Memory and processor store computer program in the memory, and the computer program is by the processor
When execution, following functions are realized:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request
According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained
Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data
Fingerprint identity validation is executed under legitimacy and integrality.
Preferably, the legitimacy and integrality of the fingerprint identity validation request data, the computer program quilt are determined
When the processor executes, following functions are realized:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message
Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as
The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature
Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible
Appoint.
Preferably, finger print information to be certified is obtained, when the computer program is executed by the processor, is realized following
Function:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Preferably, fingerprint identity validation is executed under the legitimacy of data and integrality, the computer program is described
When processor executes, following functions are realized:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server
The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information
It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
Above-mentioned technical proposal has the advantages that:
The technical program provides a set of signature sign test mechanism, when responding distinctive application program fingerprint certification request, meeting
To sending data to carry out legitimacy certification in application program, trusted mechanism is established between application program and fingerprint certification device.
When fingerprint certification device sends authenticating transactions toward finger print identifying server, by sign test mechanism of signing, number is sent and returns in guarantee
According to legitimacy and integrality, third party's program intercepts and do not distorted.Also, the technical program can be effectively in public platform spy
The certain of color application service need to judge when verifying client itself identity, ensure that client personal information can only
It is inquired by account and is operated.For each branch, this device can be utilized, develops some with individual character
Change, the characteristic service of privacy, it is abundant to melt the e connection more application scenarios of APP.
Description of the drawings
It, below will be to embodiment in order to illustrate more clearly of the application embodiment or technical solution in the prior art
Or attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
It is some embodiments described in the application, for those of ordinary skill in the art, in not making the creative labor property
Under the premise of, other drawings may also be obtained based on these drawings.
Fig. 1 is the application schematic diagram of the technical program;
Fig. 2 is that the embodiment of the present application proposes a kind of fingerprint identity validation method flow diagram across application;
Fig. 3 is the structural schematic diagram of the fingerprint identity validation device of the embodiment of the present application;
Fig. 4 is the program flow diagram of the technical program in practical applications;
Fig. 5 is a kind of fingerprint identity validation schematic device across application that the embodiment of the present application proposes.
Specific implementation mode
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in mode is applied, the technical solution in the application embodiment is clearly and completely described, it is clear that described
Embodiment is only a part of embodiment of the application, rather than whole embodiments.Based on the embodiment party in the application
Formula, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, is all answered
When the range for belonging to the application protection.
As shown in Figure 1, for the application schematic diagram of the technical program.The technology that the technical program is related to enterprise headquarters' level is real
It is now called with the access of branch level, specifically technical solution includes at least following feature:
(1) mobile terminal 4 with fingerprint acquisition device:The terminal includes the smart mobile phone used on the market at present, tablet
Computer etc., user can be installed using the mobile terminal and e connection APP are melted in operation, and support fingerprint typing;
(2) finger print identifying server 1:The server disposition is in enterprise headquarters, for responding fingerprint identity validation device
The finger print identifying request sent, server can carry out legitimacy and integrity checking to the request data of fingerprint certification device, check
Finger print identifying can be completed after, and gives the ciphering signature data back of authentication result to fingerprint identity validation device;
(3) APP host servers 2:The server disposition is responsible for melting every enterprise headquarters layer of e connection APP in enterprise headquarters
The Batch Processing of face application function is handled;
(4) application server 3:The server disposition is in branch, the distinctive application for handling branch's exploitation
The Batch Processing of program local application function is handled, and provides report data support etc. for business department;
(5) branch office application 8:Branch office application is by each branch according to local characteristic service demand
Exploitation is supplied to client to use in the form of melting e connection public platform services;
(6) fingerprint identity validation device 9:Since present intelligent mobile terminal all supports fingerprint recognition, Ke Hu substantially
I manages it when melting e connection APP registrations, other than static login password can be arranged, can also in addition select finger print information typing, allow finger
Line information and customer accounting code are associated.
Enterprise headquarters' level provides a set of fingerprint identity validation device to each branch and is accessed and called.From technology
For angle, fingerprint identity validation device 9 is a set of open type software development kit being packaged based on SDK technologies
(SDK), the SDK is by the api interface set of completion fingerprint identity validation function and relevant configuration file and other backmans
Tool is constituted.When the page of branch office application 8 needs that the fingerprint identity validation device is called to carry out fingerprint identity validation,
Enterprise headquarters' level needs first answer the APPID of program and the api interface of required calling to bind branch, make branch
Mechanism application program 8 possesses the permission for accessing API, while the application program 8 of branch needs to introduce fingerprint identity validation SDK
Packet, and relevant parameter configuration is carried out, and api interface calling is carried out according to the flow of fingerprint identity validation, above send each interface needs
Parameter, since above step is standard configuration flow, which is not described herein again.This material introduces fingerprint identity validation dress
Set each interface mould completed branch office application calling fingerprint identity validation device and be finally completed fingerprint identity validation
Logical relation between the function of block and each function module.
In addition, fingerprint identity validation device need establish and branch office application between and with finger print identifying service
Trusted relationships between device, this trusted relationships are realized using the mechanism that ciphering signature and sign test are decrypted.In order to establish branch
Trusted relationships between mechanism application program, fingerprint identity validation device and fingerprint identity validation server three, need to set
Two sets of public and private keys carry out data in fingerprint identity validation device and branch office application and fingerprint identity validation server
When interaction, it is required for agreement encrypting and decrypting and the algorithm for sign test of signing, ensures the legitimacy of request and return data and complete
Property.
Specifically, when certain business in branch's distinctive application program need that enterprise headquarters' Fingerprint Identity is called to recognize
When client itself identity is identified in card device, label can be encrypted in the request data sent in branch's distinctive application program
Name, fingerprint identity validation device determine the legitimacy and integrality of data, that is, establish trusted relationships, journey after sign test is decrypted
Sequence will arouse fingerprint identity validation interface, and after client presses fingerprint, fingerprint identity validation device can send fingerprint to recognize by again
Signature is encrypted in the request data of card server, establishes credible between fingerprint identity validation device and finger print identifying server
Relationship, system can go up the corresponding personal account information of the host query fingerprint, and personal account corresponding with e connection login accounts are melted is believed
Whether breath is consistent, determines whether that the people of operation is client itself, is operated into next step.It is carried out in finger print identifying server
When authentication result is back to branch office application by data back to fingerprint certification device and fingerprint certification device, equally
Also it can establish triangular trusted relationships by the way of reverse encryption signature and sign test decryption, ensure the legal of data transmission
Property and integrality.
Based on foregoing description, as shown in Fig. 2, proposing a kind of fingerprint identity validation method across application for the embodiment of the present application
Flow chart.Including:
Step 201):Obtain the fingerprint identity validation request data after ciphering signature.
In the present embodiment, obtain ciphering signature after fingerprint identity validation request data the step of include:
Establish the connection communication with the branch office application;
In communication process, the fingerprint identity validation request after ciphering signature is obtained from the branch office application
Data.
Step 202):Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the Fingerprint Identity
The legitimacy and integrality of certification request data.
In the present embodiment, the step of legitimacy and integrality for determining the fingerprint identity validation request data includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message
Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as
The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature
Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible
Appoint.
Step 203):Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint body is obtained
Part certification request data.
In the present embodiment, message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
Step 204):Obtain finger print information to be certified.
In the present embodiment, the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
Step 205):Label are encrypted to the fingerprint identity validation request data and the finger print information to be certified
Name, fingerprint identity validation is executed under the legitimacy and integrality of data.
In the present embodiment, include the step of execution fingerprint identity validation under the legitimacy of data and integrality:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server
The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information
It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
To make the purpose, technical scheme and advantage of the technical program be more clearly understood, below in conjunction with specific embodiment, and
With reference to attached drawing, the present apparatus and method are further described.
As shown in Figure 1, melting e connection APP7 is functionally equivalent to a client browser, it is responsible for showing branch
The interactive interface of application program 8 (one or more) and fingerprint identity validation device 9 is user and branch office application 8
The interaction channel of one data inputting and data output is provided between (one or more) and fingerprint identity validation device 9.
It is a software development in technology realization, it is with development kit for fingerprint identity validation device 9
The mode of SDK is supplied to each branch when developing characteristic branch office application 8 in melting e connection APP 7 by enterprise headquarters
Access and calling.The data interaction of fingerprint identity validation device 9 and mobile terminal 4 is mainly responsible for acquisition mobile terminal hardware and sets
Standby related data, judges whether the mobile terminal 4 supports fingerprint function.Fingerprint identity validation device 9 and fingerprint acquisition device 6
Data interaction, be mainly responsible for acquisition user fingerprints information.Fingerprint identity validation device 9 and the data interaction for melting e connection APP 7,
The channel data and APP user data for obtaining and melting e connection APP are mainly responsible for, the acquisition of channel data is closed for checking that channel calls
Method will be unable to call fingerprint identity validation work(if branch office application is run on melting e connection APP7 channels
Can, APP user data judge user whether there are finger-print cipher, whether match fingerprint and user account consistent etc..Fingerprint Identity
The data interaction of authentication device 9 and branch office application 8 is mainly responsible for response branch office application 8 and calls fingerprint
The request of identification authentication system 9 obtains the ciphering signature data that branch office application 8 uploads, line program legitimacy of going forward side by side
It checks, establishes trusted relationships between the two, after the completion of fingerprint identity validation, authentication result can be returned to branch's machine by device 9
Structure application program 8 is illustrated in and melts on the interfaces e connection APP7, and shows result on screen 5.
The background process of fingerprint identity validation, by fingerprint identity validation device 9 sending fingerprint identity validation in authentication data
Server 1 is completed, and the request response between fingerprint identity validation device 9 and fingerprint identity validation server 1 is directed to signature and recognizes
Card mechanism establishes the credible of fingerprint identity validation device 9 and finger print identifying server 1 by ciphering signature and sign test decryption mechanisms
Relationship ensures the legitimacy of certification request and the integrality of data.
For branch office application 8, the localization of branch office application 8 (including one or more)
Consistency operation is completed by corresponding application server 3, and branch office application 8 needs host to complete the function of merchandising, by
Branch office application 8 and melt e connection APP 7 carry out data interaction, act on behalf of forward by way of on send melt e join APP hosts
Server 2 is completed.
As shown in figure 3, the structural schematic diagram of the fingerprint identity validation device for the embodiment of the present application.It is described in detail below:
(1) fingerprint identity validation device 9 is by interactive controlling module a1, information security module b1 and fingerprint authentication module c1 structures
At.
(2) interactive controlling module a1 is responsible for making requests between fingerprint identity validation device 9 and branch office application 8
Response, data interaction and authentication result passback;Information security module b1 is responsible for completing to application program, fingerprint identity validation mould
Safety inspection between block and background process three and establishing is trusted, and prevents when carrying out finger print identifying appearance by third equation
The case where sequence is kidnapped or data are tampered;Fingerprint authentication module c1 is responsible for completing the backstage of fingerprint collecting and fingerprint identity validation
Processing.
(3) interactive controlling module a1 includes:Process communication unit a12, data processing unit a13, Logical processing unit a14
With result back propagation unit a15, the concrete function of wherein each unit is described as follows:Process communication unit a12 completes branch and answers
The request response that fingerprint identity validation device 9 is called with program 8, establishes branch office application 8 and fingerprint identity validation dress
Set 9 communication process.Data processing unit a13 is responsible for two parts data processing, first, the request to branch office application 8
Data are handled, after process communication unit a12 establishes calling process, by the procedural legality of sign test decryption unit b12
After certification, data processing unit a13 can obtain the request clear data after decryption, and be converted to and subsequently do required for finger print identifying
Data format, second is that after finger print identifying unit c15 completes finger print identifying operation, by sign test decryption unit b12 to backstage
After the result data of passback carries out data validity checking, data processing unit a13 can obtain the result clear data after decryption,
And be converted to the data type needed for distinctive application program.As a result back propagation unit a15 is responsible for transformed result data to unite
One data format returns to distinctive application program and is shown.Logical processing unit a14 is responsible for completing one before finger print identifying
A little logic functions judgements, including:Whether whether mobile terminal support fingerprint collecting, user when APP is registered there are finger-print cipher,
Whether distinctive application PROGRAMMED REQUESTS is legitimate request etc..
(4) information security module b1 includes:Sign test decryption unit b12 and ciphering signature unit b13, the wherein tool of each unit
Body function is described as follows:Sign test decryption unit b12 is responsible for carrying out data validation to two parts data, first, answering characteristic
It being authenticated with the signed data sent in program, it is ensured that the application program for initiating request is legal, and data are complete, second is that
Data validation is carried out to the authentication result data of finger print identifying server, ensures that host return data is not tampered with.
Ciphering signature unit b13 is mainly responsible for above sending the request data of fingerprint identity validation server that signature processing, packet is encrypted
The data such as finger print information and user information are included, are ensured when fingerprint identity validation device does authenticating transactions toward background server, number
It is distorted according to not being intercepted by a third party.
(5) fingerprint authentication module c1 includes:Finger print identifying interface c12, fingerprint acquiring unit c13, fingerprint pretreatment unit
C14, finger print identifying unit c15, the concrete function of wherein each unit are described as follows:Branch office application 8 arouses fingerprint body
After the finger print identifying interface c12 of part authentication device, show that a prompt user carries out the interface of fingerprint typing.Fingerprint acquiring unit
C13 is responsible for obtaining the finger print information of user's typing, and finger print information is transmitted to fingerprint pretreatment unit c14 processing.Fingerprint
Pretreatment unit c14 is responsible for checking the integrality of finger print information, if the fingerprint of user's typing is imperfect, return refers to
Line authentication interface c12, allows user to re-type.Finger print identifying unit c15 above send the data after b13 ciphering signatures to fingerprint
Authentication carries out backstage authentication operation.
As shown in figure 4, being the program flow diagram of the technical program in practical applications.With melt e join APP application program be
Example, the flow that branch office application 8 calls enterprise headquarters' fingerprint identity validation device 9 to complete user fingerprints authentication have
Body is described as:
Step 101:The data that fingerprint identity validation is asked are encrypted branch office application 8 (one or more)
After signature, finger print identifying request is initiated to fingerprint identity validation device 9;
Step 102:The process communication unit a12 of interactive controlling module a1, the finger print identifying request of customer in response end program,
Establish process communication;
Step 103:The data processing unit a13 of interactive controlling module a1 obtains mobile terminal relevant information, and by logic
Processing unit a4 judges whether support finger print identifying, if it does not, then finger print identifying fails, as a result back propagation unit a15 will lose
Information back is lost to branch office application 8, and in interface display, if mobile terminal supports fingerprint function, under entering
One step judges;
Step 104:The data processing unit a13 of interactive controlling module a1 obtains the built-in browser information of current APP, and
Judge whether the APP channels that current branch mechanism application program 8 is run are to melt e to join APP by Logical processing unit a14, if not
It is the api interface for not allowing then branch office application 8 to call fingerprint identity validation device 9, finger print identifying fails, as a result
Failure information is returned to branch office application 8 by back propagation unit a5, and in interface display, if it is, entering in next step
Judge;
Step 105:The sign test decryption unit b12 of information security module b1 is to the fingerprint that is sent on branch office application 8
Authentication signature data carry out sign test, if sign test fails, then it represents that the data that branch office application 8 is asked are illegal, refer to
Line authentification failure, as a result failure information is returned to branch office application 8 by back propagation unit a15, if sign test success, indicates
The data that branch office application 8 is asked are legal, call 8 He of branch office application of fingerprint certification device correlation API
On the authentication data sent be trusty, operated into next step;
Step 106:The sign test decryption unit b12 of information security module b1 is after sign test success, data processing unit a13 profits
Message decryption is carried out with decipherment algorithm, obtains finger print identifying request data;
Step 107:The Logical processing unit a14 of interactive controlling module a1 according to user fingerprints certification request relevant parameter,
To APP host servers 2, the user is inquired when registering APP accounts, if there are finger-print ciphers, if not staying finger-print cipher,
Then finger print identifying fails, if there are finger-print cipher, does and operates in next step;
Step 108:After all logic judgments in front all pass through, fingerprint authentication module c1 arouses finger print identifying interface c12,
It is shown in mobile terminal screen 5;
Step 109:Finger print identifying interface c12 waits for user fingerprints typing, user to be filled by the fingerprint collecting of mobile terminal
Set 6, press fingerprint, fingerprint acquiring unit c13 obtains finger print information from mobile terminal 4, give fingerprint pretreatment unit c14 into
Row processing;
Step 110:The fingerprint pretreatment unit c14 of fingerprint authentication module c1 carries out finger print information integrity checking, judges
Whether fingerprint typing is complete, and interface is returned to if imperfect, and user is prompted to press fingerprint again, if finger print information is complete,
It is operated into next step;
Step 111:Label are encrypted in request data and finger print information by the finger print identifying unit c15 of fingerprint authentication module c1
Name, and will be given in the request data after ciphering signature to finger print identifying server 1;
Step 112:Finger print identifying server 1 first carries out sign test to the request data sent on fingerprint identity validation device 9, sentences
Disconnected data validation, if sign test fails, finger print identifying failure, and error message is returned, if sign test success, entrance are next
Step operation;
Step 113:If the success of 1 sign test of finger print identifying server, recognizes the fingerprint sent on fingerprint identity validation device 9
Card request carries out fingerprint identity validation, and authentication result is returned fingerprint identity validation device 9;
Step 114:The data processing unit a13 of interactive controlling module a1 obtains the certification of 1 passback of Fingerprint Identity server
Result data, and sign test decryption unit b12 is transferred to carry out data sign test;
Step 115:If sign test fails, indicate that data are illegal, in fact it could happen that data are tampered or data are not come
From finger print identifying server 1, finger print identifying failure is done if sign test success and is operated in next step;
Step 116:After sign test success, encryption data is decrypted in sign test decryption unit b12, obtains finger print identifying result
Data, and authentication result is transmitted to branch office application 8 by result back propagation unit a15;
Step 117:After branch office application 8 obtains authentication result, judge whether authentication result mark is success, such as
Fruit authentication result mark is failure, then entire finger print identifying failure, if authentication result mark is successfully, entire finger print identifying
Success, branch office application 8 can carry out next step operation.
As shown in figure 5, a kind of fingerprint identity validation schematic device across application proposed for the embodiment of the present application.It is described
Device includes:Computer program is stored in memory a and processor b, the memory a, the computer program is by the place
When managing device b execution, following functions are realized:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation number of request
According to legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation request is obtained
Data;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in data
Fingerprint identity validation is executed under legitimacy and integrality.
In the present embodiment, the legitimacy and integrality of the fingerprint identity validation request data, the computer are determined
When program is executed by the processor b, following functions are realized:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal props up according to the end message
Hold finger print identifying;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, such as
The APP channels of the currently running application program of fruit are legal, then to the progress of the fingerprint identity validation request data after ciphering signature
Sign test;
If sign test success, then it represents that the fingerprint identity validation request data and finger print identifying application program are credible
Appoint.
In the present embodiment, finger print information to be certified is obtained, when the computer program is executed by the processor b,
Realize following functions:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
In the present embodiment, fingerprint identity validation, the computer program are executed under the legitimacy of data and integrality
When being executed by the processor b, following functions are realized:
After fingerprint identity validation request data sign test success, fingerprint to be certified is obtained from finger print identifying server
The authentication result encryption information of information;
Data sign test is carried out to the authentication result encryption information, if sign test success, to authentication result encryption information
It is decrypted, obtains finger print identifying as a result, and the finger print identifying result is sent to the branch office application.
The technical program takes full advantage of industrial and commercial bank in the technical advantage in finger print identifying field, is applied for each branch
Program provides a set of fingerprint identity validation function of can be used for melting and be called when e connection APP progress distinctive application exploitations, the technical side
The major advantage of case is shown as:
(1) using simple:It is supplied since enterprise headquarters' level provides a set of fingerprint identity validation device based on SDK frames
Branch calls, and branch is in use, need to only do easy configuration and according to sending correct data complete on interface specification
At calling.
(2) safe:Since fingerprint identity validation device provides a set of signature sign test mechanism, in response distinctive application
When program fingerprint certification request, it can be filled in application program and finger print identifying to sending data to carry out legitimacy certification in application program
Trusted mechanism is established between setting.When fingerprint certification device sends authenticating transactions toward finger print identifying server, pass through sign test of signing
Mechanism send legitimacy and integrality with returned data in guarantee, not by third party's program intercepts and distorts.
(3) easy to operate:Fingerprint identity validation device can be presented in logic verify and the data processing for doing some from the background
Only a fingerprint input interface and the verification result of user, is not necessarily to other extra operations.
(4) expansion is good:Since fingerprint identity validation device can be effectively in certain need of public platform distinctive application service
Judge when verification to client itself identity, ensures that client personal information can only be inquired by account
And operation.For each branch, this device can be utilized, developing some has personalized, privacy characteristic industry
Business, it is abundant to melt the e connection more application scenarios of APP.
In the present embodiment, the memory includes but not limited to random access memory (Random Access
Memory, RAM), read-only memory (Read-Only Memory, ROM), caching (Cache), hard disk (Hard Disk
Drive, HDD) or storage card (Memory Card).
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with
Take such as microprocessor or processor and storage can by computer readable program code that (micro-) processor executes (such as
Software or firmware) computer-readable medium, logic gate, switch, application-specific integrated circuit (Application Specific
Integrated Circuit, ASIC), the form etc. of programmable logic controller (PLC) and embedded microcontroller.
What the fingerprint identity validation method across application that this specification embodiment provides, memory and processor were realized
Concrete function can contrast explanation with the aforementioned embodiments in this specification, and can reach the skill of aforementioned embodiments
Art effect, just repeats no more here.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog2.Those skilled in the art
It will be apparent to the skilled artisan that only needing method flow slightly programming in logic and being programmed into integrated circuit with above-mentioned several hardware description languages
In, so that it may to be readily available the hardware circuit for realizing the logical method flow.
It is also known in the art that in addition to realizing client, server in a manner of pure computer readable program code
In addition, completely can by by method and step carry out programming in logic come so that client, server with logic gate, switch, special
The form of integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. realizes identical function.Therefore this client,
Server is considered a kind of hardware component, and can also be regarded to the device for realizing various functions that its inside includes
For the structure in hardware component.Or even, can will be considered as either implementation method for realizing the device of various functions
Software module can be structure in hardware component again.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It is realized by the mode of software plus required general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be expressed in the form of software products, the computer software product
It can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that a computer equipment
(can be personal computer, server either network equipment etc.) executes each embodiment of the application or embodiment
Method described in certain parts.
Each embodiment in this specification is described in a progressive manner, identical similar between each embodiment
Just to refer each other for part, what each embodiment stressed is the difference with other embodiment.In particular, needle
For the embodiment of client, the introduction control for being referred to the embodiment of preceding method is explained.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Usually, program module includes routines performing specific tasks or implementing specific abstract data types, program, object, group
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage device.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that there are many deformations by the application
With variation without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application
Spirit.
Claims (10)
1. a kind of fingerprint identity validation method across application, which is characterized in that including:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation request data
Legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation number of request is obtained
According to;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in the legal of data
Fingerprint identity validation is executed under property and integrality.
2. the method as described in claim 1, which is characterized in that obtain the fingerprint identity validation request data after ciphering signature
Step includes:
Establish the connection communication with branch office application;
In communication process, the fingerprint identity validation number of request after ciphering signature is obtained from the branch office application
According to.
3. the method as described in claim 1, which is characterized in that determine the fingerprint identity validation request data legitimacy and
The step of integrality includes:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal is supported to refer to according to the end message
Line certification;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, if worked as
The APP channels of the application program of preceding operation are legal, then to the carry out sign test of the fingerprint identity validation request data after ciphering signature;
If sign test success, then it represents that the fingerprint identity validation request data and the equal trusted of finger print identifying application program.
4. the method as described in claim 1, which is characterized in that the step of obtaining the fingerprint identity validation request data be:
Message decryption is carried out using decipherment algorithm, obtains finger print identifying request data.
5. method as claimed in claim 3, which is characterized in that the step of obtaining finger print information to be certified include:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
6. method as claimed in claim 5, which is characterized in that execute Fingerprint Identity under the legitimacy and integrality of data and recognize
The step of card includes:
After fingerprint identity validation request data sign test success, finger print information to be certified is obtained from finger print identifying server
Authentication result encryption information;
Data sign test is carried out to the authentication result encryption information, if sign test success, carries out authentication result encryption information
Decryption obtains finger print identifying as a result, and the finger print identifying result is sent to branch office application.
7. a kind of fingerprint identity validation device across application, which is characterized in that described device includes:Memory and processor, institute
It states and stores computer program in memory, when the computer program is executed by the processor, realize following functions:
Obtain the fingerprint identity validation request data after ciphering signature;
Sign test is carried out to the fingerprint identity validation request data after ciphering signature, determines the fingerprint identity validation request data
Legitimacy and integrality;
Under the legitimacy and integrality of the fingerprint identity validation request data, the fingerprint identity validation number of request is obtained
According to;
Obtain finger print information to be certified;
Signature is encrypted to the fingerprint identity validation request data and the finger print information to be certified, in the legal of data
Fingerprint identity validation is executed under property and integrality.
8. device as claimed in claim 7, which is characterized in that determine the fingerprint identity validation request data legitimacy and
Integrality when the computer program is executed by the processor, realizes following functions:
The end message for sending fingerprint identity validation request data is obtained, judges whether terminal is supported to refer to according to the end message
Line certification;
If terminal supports finger print identifying, judge whether the APP channels of the currently running application program of terminal are legal, if worked as
The APP channels of the application program of preceding operation are legal, then to the carry out sign test of the fingerprint identity validation request data after ciphering signature;
If sign test success, then it represents that the fingerprint identity validation request data and the equal trusted of finger print identifying application program.
9. device as claimed in claim 8, which is characterized in that obtain finger print information to be certified, the computer program quilt
When the processor executes, following functions are realized:
Inquiry sends the log-on message of the user of the finger print identifying request data, is confirmed whether that there are finger-print ciphers;
If there are finger-print ciphers, finger print information is obtained, and ensures the integrality of the finger print information obtained.
10. device as claimed in claim 9, which is characterized in that execute Fingerprint Identity under the legitimacy and integrality of data
Certification when the computer program is executed by the processor, realizes following functions:
After fingerprint identity validation request data sign test success, finger print information to be certified is obtained from finger print identifying server
Authentication result encryption information;
Data sign test is carried out to the authentication result encryption information, if sign test success, carries out authentication result encryption information
Decryption obtains finger print identifying as a result, and the finger print identifying result is sent to branch office application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810266176.XA CN108566389B (en) | 2018-03-28 | 2018-03-28 | Cross-application fingerprint identity authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810266176.XA CN108566389B (en) | 2018-03-28 | 2018-03-28 | Cross-application fingerprint identity authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108566389A true CN108566389A (en) | 2018-09-21 |
CN108566389B CN108566389B (en) | 2021-02-23 |
Family
ID=63533148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810266176.XA Active CN108566389B (en) | 2018-03-28 | 2018-03-28 | Cross-application fingerprint identity authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108566389B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110308955A (en) * | 2019-06-05 | 2019-10-08 | 阿里巴巴集团控股有限公司 | A kind of interface call method, system and equipment |
CN110636498A (en) * | 2019-11-08 | 2019-12-31 | 国网电子商务有限公司 | Identity authentication method and device of mobile terminal based on network electronic identity |
CN111542050A (en) * | 2020-03-27 | 2020-08-14 | 广西东信易联科技有限公司 | TEE-based method for guaranteeing remote initialization safety of virtual SIM card |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1674501A (en) * | 2005-03-23 | 2005-09-28 | 西安青松科技股份有限公司 | File enciphered signature system based on fingerprint and realizing method thereof |
CN104134030A (en) * | 2014-07-31 | 2014-11-05 | 中山市品汇创新专利技术开发有限公司 | E-bank safety certification method based on living fingerprint verification |
CN106411533A (en) * | 2016-11-10 | 2017-02-15 | 西安电子科技大学 | On-line fingerprint authentication system and method based on bidirectional privacy protection |
CN106899552A (en) * | 2015-12-21 | 2017-06-27 | 中国电信股份有限公司 | Authentication method, certification terminal and system |
CN107196901A (en) * | 2017-03-30 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of identity registration and the method and device of certification |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107316381A (en) * | 2016-09-29 | 2017-11-03 | 中国工商银行股份有限公司 | A kind of sales counter information processing method, terminal and business handling system |
CN107395589A (en) * | 2017-07-18 | 2017-11-24 | 深圳市金立通信设备有限公司 | Finger print information acquisition methods and terminal |
US20180054312A1 (en) * | 2016-08-22 | 2018-02-22 | Mastercard International Incorporated | Method and system for secure fido development kit with embedded hardware |
-
2018
- 2018-03-28 CN CN201810266176.XA patent/CN108566389B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1674501A (en) * | 2005-03-23 | 2005-09-28 | 西安青松科技股份有限公司 | File enciphered signature system based on fingerprint and realizing method thereof |
CN104134030A (en) * | 2014-07-31 | 2014-11-05 | 中山市品汇创新专利技术开发有限公司 | E-bank safety certification method based on living fingerprint verification |
CN106899552A (en) * | 2015-12-21 | 2017-06-27 | 中国电信股份有限公司 | Authentication method, certification terminal and system |
US20180054312A1 (en) * | 2016-08-22 | 2018-02-22 | Mastercard International Incorporated | Method and system for secure fido development kit with embedded hardware |
CN107316381A (en) * | 2016-09-29 | 2017-11-03 | 中国工商银行股份有限公司 | A kind of sales counter information processing method, terminal and business handling system |
CN106411533A (en) * | 2016-11-10 | 2017-02-15 | 西安电子科技大学 | On-line fingerprint authentication system and method based on bidirectional privacy protection |
CN107196901A (en) * | 2017-03-30 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of identity registration and the method and device of certification |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107395589A (en) * | 2017-07-18 | 2017-11-24 | 深圳市金立通信设备有限公司 | Finger print information acquisition methods and terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110308955A (en) * | 2019-06-05 | 2019-10-08 | 阿里巴巴集团控股有限公司 | A kind of interface call method, system and equipment |
CN110308955B (en) * | 2019-06-05 | 2023-03-31 | 创新先进技术有限公司 | Interface calling method, system and equipment |
CN110636498A (en) * | 2019-11-08 | 2019-12-31 | 国网电子商务有限公司 | Identity authentication method and device of mobile terminal based on network electronic identity |
CN111542050A (en) * | 2020-03-27 | 2020-08-14 | 广西东信易联科技有限公司 | TEE-based method for guaranteeing remote initialization safety of virtual SIM card |
CN111542050B (en) * | 2020-03-27 | 2021-05-18 | 广西东信易联科技有限公司 | TEE-based method for guaranteeing remote initialization safety of virtual SIM card |
Also Published As
Publication number | Publication date |
---|---|
CN108566389B (en) | 2021-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2022206815B2 (en) | Universal digital identity authentication service | |
US20240104567A1 (en) | System and method linking to accounts using credential-less authentication | |
TW201741922A (en) | Biological feature based safety certification method and device | |
CN108684041A (en) | The system and method for login authentication | |
US11588638B2 (en) | Digital notarization using a biometric identification service | |
JP2014529964A (en) | System and method for secure transaction processing via a mobile device | |
US20200196143A1 (en) | Public key-based service authentication method and system | |
US11824850B2 (en) | Systems and methods for securing login access | |
CN111832005B (en) | Application authorization method, application authorization device and electronic equipment | |
CN107196943B (en) | A kind of security display implementation method of private data in third-party platform | |
US20240195633A1 (en) | Call center web-based authentication using a contactless card | |
US20200410494A1 (en) | Systems and Methods of Electronic Identity Verification | |
JP2024079694A (en) | System and method for pre-authentication of customer support calls - Patents.com | |
CN110247758A (en) | The method, apparatus and code management device of Password Management | |
CN108566389A (en) | A kind of fingerprint identity validation method and device across application | |
CN106453273B (en) | A kind of information insurance management system and method based on cloud | |
KR102123405B1 (en) | System and method for providing security membership and login hosting service | |
KR20130048532A (en) | Next generation financial system | |
US20200204377A1 (en) | Digital notarization station that uses a biometric identification service | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
TWM583082U (en) | User identity verification system for safety transaction environment | |
Agwanyanjaba | Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push. | |
CN113645239B (en) | Application login method and device, user terminal and storage medium | |
CN114428970A (en) | Service calling method, terminal device, server and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |